National Cybersecurity Policy & Implementation for Government of Indonesia

Size: px
Start display at page:

Download "National Cybersecurity Policy & Implementation for Government of Indonesia"

Transcription

1 Country Paper In Cybersecurity Initiative National Cybersecurity Policy & Implementation for Government of Indonesia by Hammam Riza BPPT Moedjiono DepKominfo Jakarta 2006

2 1 Status of Information and Communication Technology 1.1 Telecoms and Information Technology Background Indonesia s political instability, volatile economy and half-hearted telecommunications deregulation have created a high-risk environment for investors, and considerably slowed the pace of progress in the telecoms sector. Indonesia had 4.3 fixed phone lines per 100 people in 2004, or just 9.7m telephone lines. However, coverage is greater than these measures suggest, owing to 220,000 wartel (telephone kiosks). The inadequacy of fixed-line provision has led to rapid growth in mobile-phone subscriptions, which stood at 7.4m in 2004, up from 6.3m in Personal computer (PC) and Internet penetration is also low, although rising rapidly, with just 11 PCs for every 1,000 people and just 3.6 Internet users per 100 people in There are over 6,000 local companies producing computer equipment, but they are typically small in size and the large foreign players continue to play a dominant role in the market. Pirated software and computer equipment and mobile-phone counterfeits are readily available. 1.2 Demand Indonesia has low teledensity, at an estimated 4.6 lines per 100 people in This compares with an estimated 12 lines in Thailand and 18 lines in Malaysia. There are, however, 220,000 wartel (telephone kiosks), covering even the remotest areas, which means that overall telephone coverage is far higher than the number of lines suggests. Businesses account for 19.8% of lines, households for 78.8% and the government for the remainder. An international connection service is available to only 300,000 people, or around 0.2% of the population (with business accounting for 94% of this total, households for 5.6% and the government for 0.4%). Teledensity rose sharply during the 1990s, with an increase in the number of telephone lines from 1.4m in 1992 to 4.7m in However, the economic crises led to the rescheduling and indefinite delay of a number of expansion projects. Mobile-phone penetration is still relatively low in Indonesia, at around 14 phones per 100 inhabitants (2004 estimates), compared with 53 in Malaysia, but the market is growing rapidly. By end-2002 the mobile market was larger than the fixed-line market. Users are estimated to have increased from 6.6m at end-2001 to over 32m by end Of these, 40% of users are based in the greater Jakarta area. Private involvement and investment in the sector has meant that it is more competitive and dynamic than its fixed-line competitor. There were estimated 9.3m Internet users in Indonesia at end-2004, according to Pyramid Research, a UKbased telecoms consultancy. It is estimated that well over 50% of users access the Internet via Internet cafes, while a further 40% access the Internet from the workplace. PC penetration is also growing rapidly, 1

3 however, and had reached an estimated 12.8 per 1,000 people at end In 2003 the Indonesian Association of Internet Service Providers (APJII) announced an ambitious program to bring together public and private organizations to connect more of Indonesia s secondary schools to the Internet. Two US firms, Oracle and Cisco, have taken the lead roles in this campaign. Indonesia information technology (IT) market is one of the smallest in the Asian region, according to IDC, an IT and telecoms advisory firm. IDC reports that IT spending was US$1.4bn in 2003 and rose by 11% year on year to US$1.55bn in This compares with US$2.8bn in Malaysia and US$2.2bn in Thailand in 2004 (both much smaller countries in population terms). The commercial sector accounts for about 80% of Indonesia's IT spending, with consumer spending accounting for about 10%. 1.3 Supply of Technology At end-2004 there were an estimated 200 software and information technology (IT) service companies in Indonesia and 6,000 hardware companies. The majority of the local companies are original equipment manufacturers (OEMs) producing personal computers (PCs) and peripherals for the local market. A number of large US, Japanese and South Korean companies such as Mitsubishi, Sharp, LG Electronics, Dell and Sony also have manufacturing facilities there. Typically, however, imports from China of computer hardware goods are cheaper than locally produced equipment. Indonesia is a signatory to the World Trade Organization (WTO) Information Technology Agreement (ITA). The ITA is essentially a tariff-cutting mechanism, which requires developing-country signatories, including Indonesia, to remove all tariffs on IT equipment by the end of Although Indonesia is cutting tariffs in accordance with its schedule, it has at various times imposed other taxes, such as a luxury sales tax, or charges. Software piracy is a major problem in Indonesia. The Business Software Alliances (BSA) reports that pirated software accounted for 88% of Indonesia's software market in 2002, inflicting losses estimated at US$79m on software producers (in 2003, 88%, US$158m losses; in 2004, 87%, US$183m losses; in %, US$280m losses). The government has enacted an intellectual property rights law in an effort to tackle software piracy, but faces the more formidable tasks of swaying public opinion and enforcement. The latest effort in legalizing the use of software is the Indonesia Goes Open Source (IGOS) initiative from five ministries lead by Ministry of Research and Technology and Ministry of Information and Communication. IGOS Consortium is formed to develop, deploy and support the implementation of IGOS Desktop system in all government institutions. 2

4 The Indonesian government has promoted the rise of domestic technology firms. Major local producers include Mugen, AAC, Aldo, ACS, ICM, Ascom, DMC, Access, NET, Procom, CBM, Columbia, Hitech and Centrin. Together, Mugen, AAC, ACM, Aldo and Access represent almost 60% of the market. They supply their products primarily to small companies, government and households. However, foreign companies remain prominent suppliers of IT and telecoms equipment. Computer clone manufacturers as well as wellknown firms, including Compaq (US), IBM (US), Hewlett-Packard (US) and Acer (Taiwan), operate in the market. Investment in information and communications technology (ICT) manufacturing is booming in some parts of the country, particularly in the free-trade zones of Batam and Bintan, both of which are situated near Singapore. Foreign companies have set up production sites for radio transmission sets, fibre-optic components, cellular phone parts and electronics. In 2004 Matsushita Electric Industrial (Japan) announced that it was planning to spend about US$5m on a new computer-equipment factory, and US-based E20 Communications is to double output of fibre-optic parts from its plant in Bintan. 2 Cybersecurity Policy The Indonesia government should set forth several priorities in order to have a national strategy for cyber security, including security response system, threat and vulnerability reduction program, security awareness and training program and security for government s cyberspace. Based on the above aspects and examining other national security strategies as suggested in Implementing Homeland Security for Enterprise IT by Michael Erbschloe, we have devised several objectives for Indonesia s national cybersecurity policy. To meet the goals and participate in a national cyberspace security response system, the government of Indonesia should direct all government and local organization to take or be prepared to take the following steps: Prepare to participate in public-private architecture for responding to national-level cyberincidents. This may mean that under certain alert conditions organizations will need to report various types of activities and intrusion attempts. Prepare to contribute to the development of tactical and strategic analysis of cyberattacks and vulnerability assessments. This will require more detailed reporting of activities and intrusion attempts on an ongoing basis. Join in a shared view of the health of cyberspace with government agencies and other organizations. 3

5 Be a recipient of information from an expanded cyber early warning network when the security response organization is coordinating crisis management activities for cyberspace security, and participate in national incident management efforts. Participate in the development of national public private continuity and contingency planning efforts as well as mobilization exercises to test plans. To meet the goals in a national security policy for threat and vulnerability reduction program, the government will need to instruct any organization to take or be prepared to take the following steps: Assist in enhancing law enforcement s capabilities for preventing and prosecuting cyberspace attacks. This will mean reporting more incidents and filing necessary complaints to support the prosecution of perpetrators. Be forthwith in providing information that will contribute to national vulnerability assessments so that all organizations will better understand the potential consequences of threats and vulnerabilities. Deploy new and more secure protocols and routing technology in order to reduce vulnerabilities. This will require upgrading or replacing less secure technology Deploy and use digital control systems and supervisory control and data acquisition systems that the government has labeled as trusted or that in some other way meets government standards. Deploy and upgrade software that can reduce and remediate vulnerabilities. That will mean installing patches more frequently or eliminating less secure software from the product mix used by the organization. Help to analyze infrastructure interdependencies and improve the physical security of cybersystems and telecommunications systems to make them meet potential government standards. Contribute to a process that helps to prioritize national cybersecurity research and development agendas and assess and secure emerging systems. The government of Indonesia need to endorse a national policy for security awareness and training effort, that should take into account the following steps: Participate in a comprehensive national awareness program to help enable businesses, the general workforce, and the general population to secure their own parts of cyberspace. Improve in house training and education programs to support national cybersecurity needs. Accept and have staff participate in private sector supported and widely recognized professional cybersecurity certifications. 4

6 The government also needs to build national policy for securing government s cyberspace, and organization should take or be prepared to take the following steps: Provide information to the government that helps to assess continuously threats and vulnerabilities to national cyber systems. Assure that all users in an organization that may need to use government cyber systems are trustworthy individuals and are trained on security issues. Provide information to government that may help to secure national wireless local area networks and keep those networks secure. Assist in improving security in government outsourcing and procurement by providing information as requested about contractors, equipment, software and services. Assist state and local government in establishing information technology security programs and encourage such entities to participate in information sharing and analysis centers with similar governments. 3 Cybersecurity Implementation for Government of Indonesia 3.1 General Overview In order to implement the above policy, the government of Indonesia needs to form the foundation of e- government security plan by construction of government secured infra network, government data center and government data recovery center. IPTEKnet-BPPT under the Ministry of Research and Technology together with Department of Communication and Informatica is currently running a program to be funded for construction of the above secured infrastructure (as given in the diagram below). Wire and Wireless data network will be deployed for connecting between government buildings in Jakarta and fiber optic cable and transmission equipment will be installed between the government sites where the areas have a lot of the traffic volume and demand. Wireless solution will be considered to transmit the data between government buildings in same city. Government data center will be constructed for effective management of the data from each government agencies. This center will provide the various services to government agencies such as co-location, server hosting, security and backup service etc. Data backup system will secure the integrity of files and fast restoring from the fault condition. 5

7 3.2 Scope of Implementation NGSI Sumatra GSI Kalimantan GSI Papua GSI Sulawesi GSI Java GSI Government Secured Intra-Network and Government Internet Exchange a. Fiber optic cable and transmission equipment - Metropolitan fiber optic cable with 24 government buildings. cores should be supplied and installed between - According to the installation environment of the fiber optic cable conduit, direct buried or aerial type of fiber optic cable will be used. - Total 24 MSPP(Multi Service Provisioning Platform) with STM-16 capacity will be applied at each node where fiber optic cable will be installed. MSPP will provide various high capacity interfaces such as E1, STM-1, Fast Ethernet, Gigabit Ethernet for connection to Government Internet Exchange (GIX) operated by IPTEKnet-BPPT. b. Wireless data solution - In the metropolitan areas, Wireless data solution will be installed between government buildings. - All government sites in Jakarta should be connected with wireless data solution. 6

8 c. Local area network - Local area network will be installed at around 50 government buildings in Jakarta and government buildings in regional capital city. - Based on the environment and number of users of each building, Wireless LAN or Ethernet network will be deployed Government Central Data Center a. Environment of Government Central Data Center - The floor space of data center is about 1000m 2 including operation rooms, office, equipment room and other space for power facility etc. - UPS and rectifier with backup battery will be installed to supply AC/DC power to servers and network equipment. Power facilities must have enough capacity and consider future expansion. - Access control and fire-fighting system must be implemented. b. Network equipment - High capacity backbone router and switch will be installed in government data center for internet service for government agencies. - Backbone switches will be duplicate for the network and equipment protection - Firewall and Intrusion detection switch will be installed in government data center for network security. - Access switches will be installed for networking with application servers and servers of government agencies located and operated in data center. - Modernized cabling system including UTP, fiber optic cable deployment will be applied in data center for easy cable work during any change of configuration remove of servers or network equipment. c. Application servers - Application servers and software such as Web server, mail server, DNS server will be installed at server farm of data center. - Storage and related solution will be installed and the backup system can support that all application servers use the common storage disk space for effective management of data files. Backup storage will be installed in data center for providing service continuity against active 7

9 storage failure Government Data Recovery Center a. Environment of Government Central Data Center - The floor space of data backup center is about 500m 2 including operation room, office, equipment room and other space for power facility etc. - UPS and rectifier with backup battery will be installed to supply AC/DC power to servers and network equipment. Power facilities must have enough capacity and consider future expansion. - Access control and fire-fighting system must be implemented. b. Network equipment - High capacity router and switch will be installed in data backup center for connection to main storage in data center. - Firewall and Intrusion detection switch will be installed in government data center for network security. Backup server will be installed for handling the data backup procedure. 4 Conclusion and Recommendation 4.1 Conclusion a. National security policy for cyberspace of Indonesia should be written and enacted into cybersecurity laws and enforced through the application of government regulations in protecting the information assets. These policies include security response system, threat and vulnerability reduction program, security awareness and training program and security for government s cyberspace. b. In pursuit of government objectives to develop the IT industry and promote information & communication technology with the high qualified network to be installed will increase the quality for the various government services. c. With the efficient government infrastructure, the security of government network will be increased considerably, thus the government secured infra network will greatly contribute to the economic development due to the increased productivity and security of government organizations. 4.2 Recommendation a. National Secured Infra-Network - Connection between central government and government data center. - Connection between central government and local government agencies. - Connection between government data center and internet backbone network. 8

10 b. Government Data Management Center - To install backbone router and switch for connection to internet backbone network - To install wireless and wire-line network equipment for connection to government buildings to concentrate data traffic from government agencies. - To install SAN solutions for sharing files and quickly recovering data during any fails on the servers or active storages. c. Government Data Recovery Center - To install backup equipment for storing the same data with government data center for emergency recovery. d. Government Internet Exchange - IPTEKnet-BPPT as the government service agency is leading provider for Internet services. 9

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections.

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections. IT Office Move - Tips and Check List: Office IT Move Plan Introduction: If you are moving to a New Office and/or Data Center (Cloud), or if this is also a Colocation exercise please note this is a basic

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Network Technology (10101)

Network Technology (10101) Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Linexcom Sdn Bhd. ict Group of Companies ver1.2

Linexcom Sdn Bhd. ict Group of Companies ver1.2 Linexcom Sdn Bhd No. 9B, 1 st Floor, Jalan PJS 1/27, 46150 Petaling Jaya, Selangor, MALAYSIA General : +603.7781 6020 Fax : +603.7781 6022 Web Page : http://www.linexcom.com Email : info@linexcom.com ict

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Sengsavanh College. ICT development in Lao PDR. Sakdina Rosant. Ministry of education. IT Manager. AEN Confrence 2004,Pan pacific Singapore 1

Sengsavanh College. ICT development in Lao PDR. Sakdina Rosant. Ministry of education. IT Manager. AEN Confrence 2004,Pan pacific Singapore 1 Ministry of education Sengsavanh College ICT development in Lao PDR Sakdina Rosant IT Manager Singapore 1 Main point of presentation Review of ICT development Internet development in Lao Some Important

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

North Florida Community College

North Florida Community College North Florida Community College Technology Plan Table of Contents Executive Summary... 3 Technology Vision... 5 Annual Initiatives... 6 2010 Data Center Expansions... 6 The Next 3 Years... 6 Technology

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

U.S. Cyber Security Readiness

U.S. Cyber Security Readiness U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National

More information

TECHNOLOGY PLAN SUMMARY

TECHNOLOGY PLAN SUMMARY IV. TECHNOLOGY PLAN SUMMARY The Oklahoma City Metropolitan Area Public Schools (OCMAPS) Technology Plan serves as a guide for OCMAPS funding of technology into the Oklahoma City Public School District

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

21 st Century Campus Network Responsibility Matrix 5/26/10

21 st Century Campus Network Responsibility Matrix 5/26/10 Definitions: DoIT Standards This column details the minimal configuration, which DoIT has defined in order to provide a campus-wide standard level of service. Departments may request services, which exceeds

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Sensor Network for HACCP Food Safety Management

Sensor Network for HACCP Food Safety Management Hitachi Review Vol. 59 (2010), No. 5 229 Sensor Network for HACCP Food Safety Management Hiroshi Hanyu Takanori Shimura Takuya Fukui OVERVIEW: An increasing number of companies are incorporating HACCP

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,

More information

University of Central Florida Class Specification Administrative and Professional. Network Operations Manager (Enterprise)

University of Central Florida Class Specification Administrative and Professional. Network Operations Manager (Enterprise) Network Operations Manager (Enterprise) Job Code: 2552 Manage enterprise networks. Oversee the monitoring, testing, and trouble shooting of all network components (network software and hardware and network

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

Job Description Information Services Coordinator

Job Description Information Services Coordinator Job Description Position Title: Information Services Coordinator Department: Reports To: Technology & Infrastructure Manager Purpose The Information Services Coordinators role is to ensure the stability,

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013 JOB OPENING Position: Reports To: Manager of Technology Operations Location: Aledo Position Requirements: Associate s degree in computer science or electronics and/or certification such as MCSE, CNE, A+,

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Protection of Essential Infrastructure and Services

Protection of Essential Infrastructure and Services Protection of Essential Infrastructure and Services NOR AZUWA MUHAMAD PAHRI CONSULTANT, MIMOS CONSULTING GROUP, MIMOS BERHAD azuwa@mimos.my Table of Content Introduction Reality of Cyber Attack Cyber Issues

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

How To Protect Your Endpoints From Attack

How To Protect Your Endpoints From Attack 2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

How To Upgrade The Council'S Network Infrastructure

How To Upgrade The Council'S Network Infrastructure Report Asset Management 21 October 2004 I1 ICT INFRASTRUCTURE UPGRADE PROGRAMME 1. Purpose of Report To propose a programme of investment necessary to update our ICT infrastructure, making it fit for purpose

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

Wide-Area Optical Fiber Network Monitoring and Management System

Wide-Area Optical Fiber Network Monitoring and Management System by Kunihiro Yamamoto *, Masahide Ogawa *, Tetsuhiro Yamashita * and Masao Sasaki * The optical fiber cable networks that form the backbone of high-speed ABSTRACT communications are increasingly being laid

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Proactive IT Solutions More Reliable Networks Are Our Business

Proactive IT Solutions More Reliable Networks Are Our Business Proactive IT Solutions Logo Proactive IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888 B 973-233-1887

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

Network Security Policy: Best Practices White Paper

Network Security Policy: Best Practices White Paper Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security

More information

Schools and Libraries Universal Service Support Mechanism Eligible Services List

Schools and Libraries Universal Service Support Mechanism Eligible Services List Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Network Technologies

Network Technologies Network Technologies Career Cluster Information Technology Course Code 10101 Prerequisite(s) Introduction To Information Technology Careers (Recommended), Computer Applications (Recommended), Computer

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Supplemental IT Solutions: More Reliable Networks Are Our Business

Supplemental IT Solutions: More Reliable Networks Are Our Business Supplemental IT Solutions Logo Supplemental IT Solutions: More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

IT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER

IT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER BAND B POSITION CONCEPT: JOURNEY / WORKING SUPERVISOR / LEAD Multi-user System Administration Systems & Services Administration Installs, configures, and optimizes operating systems. Installs, tests, and

More information

Appendix A: Customer Preparation and Considerations

Appendix A: Customer Preparation and Considerations Appendix A: Customer Preparation and Considerations Customer participation Successful planning and implementation of a Modular Messaging system require crossfunctional participation from a variety of disciplines

More information

Appropr iated Accounts Department-wide Systems and Capital Investment Program

Appropr iated Accounts Department-wide Systems and Capital Investment Program Department-wide Systems and Capital Investment Program Mission: To modernize business processes and increase efficiencies throughout the Department of Treasury through technology investments. Program Summary

More information

IT Labor (Hourly Billable) Data Base Hosting

IT Labor (Hourly Billable) Data Base Hosting Cost Pool Definitions for Information Technology (IT) Services FY16/17 (Effective July 1, 2015) IT Labor (Hourly Billable) B/A 1365 - Programmer/Developer: EITS provides a variety of software development

More information

Cisco Network Switches Juniper Firewall Clusters

Cisco Network Switches Juniper Firewall Clusters Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches

More information

IS Network Services Senior Facilities Management Group 2 Hill Farms West Division of State Facilities

IS Network Services Senior Facilities Management Group 2 Hill Farms West Division of State Facilities POSITION SUMMARY Under the general supervision of the DOA/DSF and the DSF Telecom Supervisor, this position works closely with other Agency Telecom Services, Voice Services, Network Services, and Wide

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

Deployment of Telecommunications Networks

Deployment of Telecommunications Networks Deployment of Telecommunications Networks Definition A telecommunications network is the combination of numerous network elements that are required to support voice, data, or video services in local or

More information

The Century of Infinite Bandwidth. Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw

The Century of Infinite Bandwidth. Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw The Century of Infinite Bandwidth Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw Popular View of Internet Global Internet Traffic grows 10% to 12% per month

More information

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER Disasters or accidents would cause great harm on network infrastructure. It is unavoidable and the operation of network would be hampered for a long

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum

IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Addendum These IP/MPLS VPN Additional Terms & Conditions are part of the IP/MPLS Addendum ( Addendum ). 1. SELECTED DEFINITIONS. Unless

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Managed IT Solutions. More Reliable Networks Are Our Business

Managed IT Solutions. More Reliable Networks Are Our Business Managed IT Solutions Logo Managed IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888 B 973-233-1887

More information

Service Definition. Asta Powerproject. Project, Portfolio & Resource Management Software

Service Definition. Asta Powerproject. Project, Portfolio & Resource Management Software Asta Powerproject Service Definition Asta Powerproject Project, Portfolio & Resource Management Software Asta Development plc Kingston House, Goodsons Mews Wellington Street Thame OX9 3BX Table of Contents

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Campus Network Upgrades: Guidelines for the President July 2003

Campus Network Upgrades: Guidelines for the President July 2003 Campus Network Upgrades: Guidelines for the President July 2003 On a regular basis, college and university presidents must make decisions about large expenditures on campus and must determine whether or

More information

Korea s Innovative GIDC Development

Korea s Innovative GIDC Development Korea s Innovative GIDC Development Definition of Government Integrated Data Center GIDC provides facility infrastructures, ICT infrastructures and e-government application services that are required

More information

Are apps available for Virtual Water Assistant? No. We use a mobile website.

Are apps available for Virtual Water Assistant? No. We use a mobile website. What is a battery backup unit (BBU) sump pump? A battery backup unit (BBU) sump pump is a secondary sump pump powered by a 12V deep cycle battery that automatically protects your basement if power goes

More information

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

Safety & Security: Cyber Security

Safety & Security: Cyber Security Introduction to Homeland Security Chapter 5 Part III Safety & Security: Cyber Security Information Security and National Network Infrastructure Security Information Security: Techniques used to protect

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

I N T E L L I G E N C E A S S E S S M E N T

I N T E L L I G E N C E A S S E S S M E N T I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document

More information

Chapter 5: Understanding Internetworking Infrastructure

Chapter 5: Understanding Internetworking Infrastructure Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises

More information